How to use MITRE framework and APT19

A community superpower-MITRE APT19   How you can leverage a community superpower-The MITRE framework to combat cyber threats Introduction Cybercrime is getting more serious by the month. Hackers are getting better at tricking people into clicking on fraudulent links or opening up malicious attachments in emails. Cyber attacks are becoming organised crimes. Cybercriminals are joining…

What is the Essential 8 ?

The Australian Cyber Security Centre (ACSC) developed the Essential Eight Maturity Model, known widely as the Essential 8. The ACSC essential 8 maturity model consists of eight strategies that are part of a more extensive list called the Strategies to Mitigate Cyber Security Incidents. These eight specific strategies were singled out because they are the…

The Australian Education Sector and Cyber Attacks

Alert! The Australian Education Sector is under Attack   The recent Australian Cyber Security Centre (ACSC) threat report has revealed that approximately one-quarter of reported cyber security incidents during the 2020-21 financial year affected critical infrastructure organisations and essential services such as education. Through this period, the ACSC received over 67,500 cybercrime reports. The education…

Cyber Security Training

You don’t know what you don’t know . . .so who is responsible for teaching us?   I was browsing through Twitter on the weekend and a tweet by Gmail caught my attention. Not because of the content of the tweet. But because of the comments on that tweet. Many people replied to Google complaining…

Are you prepared for a security incident?

Introduction In February 2021, an Australian university was hit with a ransomware attack. The university quickly shut down its network to identify the infiltration, contain the breach and conduct a proper investigation. As a result, critical operations were offline, new enrolments were suspended and the university could not pay casual staff. A few days later,…

Defending against ransomware attacks

Introduction “Freeze, I’m Ma Baker. Put your hands in the air and give me all your money!” This snarling from Boney M’s “Ma Baker” song has, in today’s digital world, become: “All servers and working computers of your company have been hacked and encrypted. Your money or your data!” Imagine waking up in the morning…

Is your MacOS Safe?

Macs are safer, but… We often hear that Mac users are less likely to be targeted by cybercriminals. This statement is true because of several reasons: Apple’s macOS system is Unix-based, which makes it more difficult to exploit. Hackers simply chose to attack more popular platforms. According to NetMarketShare, Windows accounts for over 88 percent…